myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.
References
Link | Resource |
---|---|
https://blog.talosintelligence.com/2021/06/necro-python-bot-adds-new-tricks.html | Exploit Technical Description Third Party Advisory |
https://github.com/myvesta/vesta/commit/7991753ab7c5c568768028fb77554db8ea149f17 | Patch Third Party Advisory |
https://github.com/myvesta/vesta/releases/tag/0.9.8-26-43 | Third Party Advisory |
https://github.com/serghey-rodin/vesta/commit/a4e4542a6d1351c2857b169f8621dd9a13a2e896 | Patch Third Party Advisory |
https://www.exploit-db.com/exploits/49674 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-88 |
25 Oct 2022, 14:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-24 14:15
Updated : 2024-02-04 22:51
NVD link : CVE-2021-46850
Mitre link : CVE-2021-46850
CVE.ORG link : CVE-2021-46850
JSON object : View
Products Affected
vestacp
- control_panel
- vesta_control_panel
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')